Solved

Career development courses for Security

Posted on 2016-10-05
9
107 Views
Last Modified: 2016-10-23
Hi All,

i am looking to get more skills and even to a Master in Cyber Security.

Which course you would recommend so i could also use it on my Masters in Cyber Security degree?
0
Comment
Question by:mallony
  • 3
  • 3
  • 2
  • +1
9 Comments
 
LVL 14

Expert Comment

by:SIM50
ID: 41830044
What do you want to do in Security? This field is very broad and ranges from GRC to forensics.
0
 
LVL 63

Expert Comment

by:btan
ID: 41830284
Need experience and go for (ISC)2 CISSP or (ISACA) CISA that will set you in good pace and exposure for cyber security profession. Also SANS courses and degree are another you can check out esp on SANS GIAC certification
Many courses in the program use GIAC certifications as assessments of learning outcomes, and graduates of this degree program acquire more than seven GIAC certifications even before you graduate, including the GIAC Security Expert (GSE) certification, used as a capstone assessment.
https://www.sans.edu/about/faq#q1345
0
 
LVL 38

Assisted Solution

by:Rich Rumble
Rich Rumble earned 125 total points
ID: 41843446
OSCP is the only course I recommend, you get understanding you never will with CISSP/GSEC and others.
If you know how to use PC's, especially linux, you'll love the course, it's cheap too and includes the test in the price: https://www.offensive-security.com/information-security-certifications/oscp-offensive-security-certified-professional/
-rich
0
Back Up Your Microsoft Windows Server®

Back up all your Microsoft Windows Server – on-premises, in remote locations, in private and hybrid clouds. Your entire Windows Server will be backed up in one easy step with patented, block-level disk imaging. We achieve RTOs (recovery time objectives) as low as 15 seconds.

 
LVL 63

Expert Comment

by:btan
ID: 41843488
For hands-on, OSCP is good and CISSP / CISA is more on the professional "buy-in" for your prospective employer and personal career growth in the security community. Actually security conferences run the SANS courses and I do still see SANS course are pretty hands-on too e.g. GCIH, GPEN https://www.sans.org/courses/
0
 
LVL 14

Expert Comment

by:SIM50
ID: 41843542
OP still didn't answer what he wants to do... Your suggestions just cover GRC and red team. What about the rest of the security field?
0
 

Author Comment

by:mallony
ID: 41851902
There is a flow chart with separate fields professional would work and their job position they would hold?
0
 
LVL 63

Assisted Solution

by:btan
btan earned 125 total points
ID: 41851944
Actually you may want to see this framework for cybersecurity training and scope of work, going into each scope of work, it states the KPI and the job. For e.g.

under the "Securely Provision" > "→ Information Assurance Compliance", it has its set of "Knowledge, Skills, and Abilities" (e.g. "Knowledge of IA principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation)" etc) listed leading to "Tasks" (e.g. "Develop security compliance processes and/or audits for external services" etc) to perform and the "Related Job Titles" (e.g. Auditor etc)
https://niccs.us-cert.gov/workforce-development/cyber-security-workforce-framework
0
 
LVL 14

Accepted Solution

by:
SIM50 earned 250 total points
ID: 41851990
There is a flow chart with separate fields professional would work and their job position they would hold?

Not a flow chart but I think that's exactly what you are looking for.
https://tisiphone.net/2015/11/08/starting-an-infosec-career-the-megamix-chapters-4-5/
0
 

Author Closing Comment

by:mallony
ID: 41856374
Grea advice!
0

Featured Post

Simplifying Server Workload Migrations

This use case outlines the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual (P2V), virtual to physical (V2P), and cross-virtual (V2V) migration scenarios to address these challenges.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

One of the biggest threats in the cyber realm pertains to advanced persistent threats (APTs). This paper is a compare and contrast of Russian and Chinese APT's.
This article outlines the process to identify and resolve account lockout in an Active Directory environment.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…

840 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question